You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/linux-support-offline-security-intelligence-update.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -173,11 +173,11 @@ Once the signatures zip is downloaded, the mirror server can be used to host it.
173
173
Once hosted, copy the absolute path of the hosted server (up to and not including the `arch_*` directory).
174
174
175
175
> [!NOTE]
176
-
> For example, if the downloader script is executed with `downloadFolder=/tmp/wdav-update`, and the HTTP server (`www.example.server.com:8000`) is hosting the `/tmp/wdav-update` path, then the corresponding URI is: `www.example.server.com:8000/linux/production/` (verify that this within this directory, there are the`arch_*` directories).
176
+
> For example, if the downloader script is executed with `downloadFolder=/tmp/wdav-update`, and the HTTP server (`www.example.server.com:8000`) is hosting the `/tmp/wdav-update` path, then the corresponding URI is: `www.example.server.com:8000/linux/production/` (verify that within the directory, there are `arch_*` directories).
177
177
>
178
-
> We can also use the absolute path of directory (local/remote mount point). For example, if the files were downloaded by the script into a directory `/tmp/wdav-update`, then the corresponding URI is:`/tmp/wdav-update/linux/production`.
178
+
> You can also use the absolute path of directory (local/remote mount point). For example, if the files are downloaded by the script into a directory `/tmp/wdav-update`, then the corresponding URI is:`/tmp/wdav-update/linux/production`.
179
179
180
-
Once the mirror server is set up, we need to propagate this URI to the Linux endpoints as the `offlineDefinitionUpdateUrl` in the Managed Configuration as described in the next section.
180
+
Once the mirror server is set up, you need to propagate this URI to the Linux endpoints as the `offlineDefinitionUpdateUrl` in the Managed Configuration as described in the next section.
181
181
182
182
## Configure the endpoints
183
183
@@ -205,12 +205,12 @@ Use the following sample `mdatp_managed.json` and update the parameters as per t
205
205
|`automaticDefinitionUpdateEnabled`|`True`/`False`| Determines the behavior of Defender for Endpoint attempting to perform updates automatically, is turned on or off respectively. |
206
206
|`definitionUpdatesInterval`| Numeric | Time of interval between each automatic update of signatures (in seconds). |
207
207
|`offlineDefinitionUpdateUrl`| String | URL value generated as part of the mirror server setup. This can be either in terms of the remote server URL or a directory (local/remote mount point). See the previous section for information about how to specify this path.|
208
-
|`offlineDefinitionUpdate`|`enabled`/`disabled`| When set to `enabled`, the "offline security intelligence update" feature is enabled, and vice versa. |
209
-
|`offlineDefinitionUpdateFallbackToCloud`|`True`/`False`| Determine Defender for Endpoint security intelligence update approach when "offline mirror server" fails to serve the update request. If set to `true`, the update is retried via the Microsoft cloud when "offline security intelligence update" failed; else, vice versa. |
208
+
|`offlineDefinitionUpdate`|`enabled`/`disabled`| When set to `enabled`, the offline security intelligence update feature is enabled, and vice versa. |
209
+
|`offlineDefinitionUpdateFallbackToCloud`|`True`/`False`| Determine Defender for Endpoint security intelligence update approach when offline mirror server fails to serve the update request. If set to `true`, the update is retried via the Microsoft cloud when offline security intelligence update failed; else, vice versa. |
210
210
|`offlineDefinitionUpdateVerifySig`|`enabled`/`disabled`| When set to `enabled`, downloaded definitions are verified on the endpoints; else, vice versa. |
211
211
212
212
> [!NOTE]
213
-
> As of today, the "offline security intelligence update" feature can be configured on Linux endpoints via managed json only. Integration with security settings management on the security portal is in our roadmap.
213
+
> Currently, offline security intelligence updates can be configured on Linux endpoints via managed json only. Integration with Defender for Endpoint security settings management in the Microsoft Defender portal is on the roadmap, but isn't available yet.
- To trigger the "offline security intelligence update" manually to download the signatures from the mirror server on the Linux endpoints, run the following command:
249
+
- To trigger the offline security intelligence update manually to download the signatures from the mirror server on the Linux endpoints, run the following command:
250
250
251
251
```bash
252
252
mdatp definitions update
253
253
```
254
254
255
255
### Check update status
256
256
257
-
- After triggering the "offline security intelligence update" by either the automatic or manual method, verify that the update was successful by running the command: `mdatp health --details --definitions`.
257
+
- After triggering offline security intelligence updates by using either the automatic or manual method, verify that the update was successful by running the command: `mdatp health --details --definitions`.
0 commit comments